Required:
1. Cyber Security Support:
2. Demonstrated experience analyzing IT systems for cyber security vulnerabilities.
3. Demonstrated experience developing IT system or network architecture design conducting IP data flow analysis encryption configuration and vulnerability analysis using both opensource and commercial tools such as Nmap Wireshark Metasploit Canvas Kismet or BackTrack.
4. Demonstrated experience analyzing IT network configurations of devices such as firewalls routers switches VPNs or Intrusion Detection/Prevention Systems for cyber security vulnerabilities.
5. Demonstrated experience with communications protocols such as IP TCP UDP HTTP HTTPS MPLS OSPF IGRP BGP SIP H.232.
6. Demonstrated experience with multiple OSs including Windows Linux and OSX.
7. Demonstrated experience with Microsoft Windows ver.;RR2 or 2016.
8. Demonstrated experience with cloud computing technology and hypervisors such as HyperV VMWare ESX or Virtual Box.
9. Demonstrated experience with transitioning security domains and use of cross domain appliances.
10. Demonstrated experience with network management systems network storage backup systems and disaster recovery (DR) architectures.
11. Demonstrated experience performing technical risk assessments and providing technical risk mitigation guidance.
12. Demonstrated experience ensuring appropriate risk mitigation considerations risks and vulnerabilities are well understood and appropriately mitigated.
13. Demonstrated experience analyzing procurement processes of hardware software and services to comply with cyber security and operational needs.
14. Demonstrated experience creating concise and wellstructured written assessments.
15. Certifications: CISSP Certification.
Desired:
1. Cyber Security Support
2. Demonstrated experience with the Sponsors IT review boards.
3. Demonstrated experience with providing recommendations to IT architecture and design reviews.
4. Demonstrated experience with the Sponsors security policies and regulations.
5. Demonstrated experience providing recommendations in technical standards security standards and operational assurance.
6. Demonstrated experience with USG standards such as Intelligence Community Directive (ICD) 503 Federal Information Processing Standards (FIPS) National Institute of Standards and Technology (NIST) Special Publication (SP) 80037 SP 80039 SP 80053 SP 80053A SP 80060.
7. Certifications: Certified Information Security Manager (CISM) Certified Ethical Hacker.
Security Clearance Required:TS/SCI with Poly
About Avid Technology ProfessionalsAvid Technology Professionals LLC (ATP) is a premiere provider of software and systems engineering and acquisition program management services for the community. ATP is actively seeking to pursue contract opportunities with other departments and agencies in the federal government in state governments and in the commercial sectors. Delivered by seasoned experts in the IT field ATP solutions adeptly address the IT concerns manifesting in both the federal and commercial sectors.
Employee BenefitsThe ATP Employee Benefits package includes:
- A Supportive and Equitable Working Environment that is both Stimulating and Challenging
- Competitive Hourly Salary
- Unique Employee Success Sharing Program that allows ATP employees to Share in Companys Successes
- Automatic Approved Overtime (as long as contract permits)
- Retirement Pay (401K); 100% company paid immediately vested with ProfitSharing Component
- Company Medical Coverage Plans HMO Open Access PPO plans
- Company Dental Plan widely accepted comprehensive and flexible
- Progressive Overtime Policy
- Flexible Spending Account benefit
- Lucrative Referral Bonus Policy
- Holiday Scheduling that Coincides with Government Holidays
- Robust Professional Expenses & Training Program
- Computer Allowance
- Internet Allowance
- Short and Long Term Disability
- Life Insurance